Quizzes
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Computer
Thidot2
27 Questions
|
By Thanhnb | Updated: Mar 17, 2022
| Attempts: 341
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 28
🏆
Rank #--
▾
0 %
0/100
Score
0/100
1.
Post-test questionnaires (conducted after a usability test) are particularly useful for measuring?
Safety
User satisfaction
. efficiency
Learnability
Submit
Start Quiz
About This Quiz
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
Which of the following is the most appropriate as the description of code design and code management?
Codes inevitably vary, so it is important to put code books in order and to manage them.
Numerals should mainly be used as codes, and Chinese characters should not be used.
Codes should be assigned to make data classification easier, but the addition or expansion of codes should not be considered.
. It is desirable that codes are understandable by themselves. Therefore, the use of longer code is better.
Submit
3.
Software quality characteristics include reliability, usability, maintainability and portability. Which of the following explains reliability?
It indicates whether functions required for software can always be maintained normally under designated conditions.
It indicates the degree of modification which becomes necessary when software is to be used in a different computer environment.
. It indicates how easily operations can be mastered.
It indicates the degree of ease in which modification requests from users or troubles can be handled.
Submit
4.
Marks: 1 Officially, which port is used for SSH?
110
23
22
443
Submit
5.
Which is the correct statement about the recent increase in macro viruses?
Activating the system from an infected floppy disk loads the macro virus into the main meory, and then the virus...
Activating the system from an infected floppy disk loads the macro virus into the main meory, and then the virus infects the boot sectors of other floppy disks.
Since it can be easily determined as to whether a macro function is infected by a virus, infection can be...
Since it can be easily determined as to whether a macro function is infected by a virus, infection can be prevented at the time of opening a document file.
A macro virus infects document files opened or newly created after an infected document file is opened.
The execution of an infected application loads in the macro virus into the main memory, and in this process, the...
The execution of an infected application loads in the macro virus into the main memory, and in this process, the virus infects program files of other applications.
Submit
6.
Which of the following operation methods is NOT appropriate for use with a computer system used with public telephone network?
To ensure that the user does not forget the password, it is displayed on the terminal at the time of...
To ensure that the user does not forget the password, it is displayed on the terminal at the time of log on.
When there is a request for connection, a callback will be made to a specific telephone number to establish the...
When there is a request for connection, a callback will be made to a specific telephone number to establish the connection.
. If a password is not modified within a priviously specified period of time, it will no longer be possible...
. If a password is not modified within a priviously specified period of time, it will no longer be possible to connect using this password.
C. If the password is entered wrongly for a number of times determined in advanced, the line will be disconnected.
Submit
7.
Post-test questionnaires (conducted after a usability test) are particularly useful for measuring?
Safety
User satisfaction
. efficiency
Learnability
Submit
8.
A method that does not require human participants serving as test users is the
Heuristic evaluation
Rubin’s comparison test
Usability test
Pluralistic walkthrough
Submit
9.
If the heuristic function in an A* search algorithm is h( n) = 0, this A* search algorithm becomes which of the following algorithms?
Uniformed-cost search
Depth-first search
Iterative deepening search
Depth-limited search
Submit
10.
Which of the following is an accurate statement concerning an ADSL?
It enables high-speed data transmission of differing incoming and outgoing speeds, using the existing telephone line (twisted pair).
Optical fiber cable is laid down to the home to enable various communication services such as telephony, ISDN, and data...
Optical fiber cable is laid down to the home to enable various communication services such as telephony, ISDN, and data communications.
Voice and data are sent by time-divided multiplexing.
. Voice and data are separated by a terminal adapter (TA), so they can share the same line.
Submit
11.
Which of the following protocols has become a worldwide de facto standard? The protocol is used by the ARPANET in the USA, and is built into the UNIX system.
CSMA/CD
ATM
TCP/IP
ISDN
Submit
12.
There is a transposition cryptosystem in which plain text is devided into four-character blocks and in each block, the first character is moved to the third, the second to the first, the third to the fourth, and the fourth to the second. In this system, which is the correct cipher text for the plain text "DEERDIDDREAMDEEP"?
DIDDDEEPDEERREAM
EDREDDDIARMEEDPE
IDDDEPDEERDEEMRA
. ERDEIDDDEMRAEPDE
Submit
13.
What is the correct description of packet switching?
Compare to circuit switching, the latency within the network is short.
Packet switching service is not possible with ISDN.
In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals....
In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)
. By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line.
Submit
14.
Which is the most appropriate practice for user ID management?
When privileges are set for a user ID, they should be minimized.
A user having multiple user IDs should set the same password for all the IDs.
When a user ID is to be deleted, an adequate time interval should be taken after the termination of its...
When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified.
All the users involved in the same project should use the same user ID.
Submit
15.
Valid reasons for usability testing are:
Experience changes ones perception of the world
Evaluate the performance of the interaction
. Designers believe users always follow illogical paths
Testing the performance under user stress is important
Submit
16.
Which of the followig FOL sentences most matches the meaning of "Squares adjacent to wumpus are smelly"?
ThereExist S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)
ForAll S1 Smelly(S1) ForAll S2 Adjacent(S1,S2) ^ Wumpus(S2)
ForAll S1 Smelly(S1) ThereExist S2 Adjacent(S1,S2) ^ Wumpus(S2)
ThereExist S1 Smelly(S1) ForAll S2 Adjacent(S1,S2) ^ Wumpus(S2)
Submit
17.
How many heuristic function are there for a given problem?
1
0
2
Infinitely many
Submit
18.
Which is in an inappropriate way of handling passwords and a password file in the system management department?
The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring...
The depatment should recommend that users record their passwords in their notebooks in order to minimize the frequency of inquiring about their passwords.
Even if a password file records encrypted passwords, the department should make it inaccessible to general users.
It it is possible to set the term of validity of passwords, the term should be used for checking password...
It it is possible to set the term of validity of passwords, the term should be used for checking password validation.
The security managers should regularly check whether or not passwords can be easily guessed, and recommend that problem passwords be...
The security managers should regularly check whether or not passwords can be easily guessed, and recommend that problem passwords be changed.
Submit
19.
Which of the following software test methods is used to check whether modifications made for software maintenance have affected other portions or not?
Linkage tests
System tests
Operation tests
Regression tes
Submit
20.
What is the appropriate description of a router?
Converts protocols, including protocols of levels higher than the transport layer, and allows interconnection of networks having different network architectures.
Connects at the data-link layer and has traffic separating function.
Connects at the physical layer and is used to extend the connection distance.
Connects at the network layer and is used for interconnecting LAN systems to wide area network.
Submit
21.
To use E-mail on the Internet, the two protocols SMTP and POP3 are used on mail servers. Which is the appropriate explanation of this?
SMTP is a protocol for receiving, and POP3 is a protocol for sending.
SMTP is the protocol for the Internet, and POP3 is the protocol for LAN.
The SMTP is a protocol used when one side is client, and POP3 is a protocol used when both sides...
The SMTP is a protocol used when one side is client, and POP3 is a protocol used when both sides to transmit are mail servers.
SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail...
SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail from the mailbox when connected.
Submit
22.
Which of the following algorithms is NOT a local search algorithm?
Hill-climbing search
Simulated annealing search
Genetic algorithm
A* search
Submit
23.
Which of the following SQL statements can extract employee_name has whose salary is 300,000 or higher from the table human_resource?
SELECT salary FROM human_resource WHERE employee_name>=300000 GROUPBY salary
SELECT employee_name, salary FROM human_resource GROUPBY salary HAVING COUNT(*)>300000
SELECT employee_name FROM human_resource WHERE salary>=300000
SELECT employee_name COUNT(*) FROM human_resource WHERE salary>=300000 GROUPBY employee_name
Submit
24.
N a heuristic evaluation:
A group of test users conduct a formal experiment
A group of usability experts judge an interface with a detailed checklist of guidelines
A group of psychologists administer a questionnaire
A group of usability experts review a user interface according to a small set of principles
Submit
25.
Regarding relational database manipulation, which of the following statements correctly explains projection?
. Create a table by combining inquiry results from one table and the ones of the other table
Create a new table by combining tuples satisfying conditions from tuples in more than two tables
Extract the rows satisfying specific conditions from the table
. Extract the specific columns from the table
Submit
26.
Which of the following does not belong to 9 heuristics?
Speak user language
Easy to use
Provide clearly marked exits
. Minimize user memory load
Submit
27.
Software quality characteristics include reliability, usability, maintainability and portability. Which of the following explains reliability?
It indicates whether functions required for software can always be maintained normally under designated conditions.
It indicates the degree of modification which becomes necessary when software is to be used in a different computer environment.
. It indicates how easily operations can be mastered.
It indicates the degree of ease in which modification requests from users or troubles can be handled.
Submit
×
Thank you for your feedback!
View My Results
Related Quizzes
Tablet Quiz: What Tablet Should I Buy Quiz
Tablet Quiz: What Tablet Should I Buy Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (27)
Unanswered (
)
Answered (
)
Post-test questionnaires (conducted after a usability test) are...
Which of the following is the most appropriate as the description of...
Software quality characteristics include reliability, usability,...
...
Which is the correct statement about the recent increase in macro...
Which of the following operation methods is NOT appropriate for use...
Post-test questionnaires (conducted after a usability test) are...
A method that does not require human participants serving as test...
If the heuristic function in an A* search algorithm is h( n) = 0, this...
Which of the following is an accurate statement concerning an ADSL?
Which of the following protocols has become a worldwide de facto...
There is a transposition cryptosystem in which plain text is devided...
What is the correct description of packet switching?
Which is the most appropriate practice for user ID management?
Valid reasons for usability testing are:
Which of the followig FOL sentences most matches the meaning of...
How many heuristic function are there for a given problem?
Which is in an inappropriate way of handling passwords and a password...
Which of the following software test methods is used to check whether...
What is the appropriate description of a router?
To use E-mail on the Internet, the two protocols SMTP and POP3 are...
Which of the following algorithms is NOT a local search algorithm?
Which of the following SQL statements can extract employee_name has...
N a heuristic evaluation:
Regarding relational database manipulation, which of the following...
Which of the following does not belong to 9 heuristics?
Software quality characteristics include reliability, usability,...
X
OK
X
OK
Cancel
X
OK
Cancel
Your Rank: #-- / --
Leaderboard
✕